Sciweavers

5962 search results - page 1030 / 1193
» Working with Patterns and Code
Sort
View
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
16 years 5 months ago
Ontology-Aware Search on XML-based Electronic Medical Records
As the use of Electronic Medical Records (EMRs) becomes more widespread, so does the need for effective information discovery on them. Recently proposed EMR standards are XML-based...
Anand Ranganathan, Fernando Farfán, Redmond...
SIGSOFT
2007
ACM
16 years 4 months ago
Measuring empirical computational complexity
The standard language for describing the asymptotic behavior of algorithms is theoretical computational complexity. We propose a method for describing the asymptotic behavior of p...
Simon Goldsmith, Alex Aiken, Daniel Shawcross Wilk...
WWW
2007
ACM
16 years 4 months ago
Turning portlets into services: the consumer profile
Portlets strive to play at the front end the same role that Web services currently enjoy at the back end, namely, enablers of application assembly through reusable services. Howev...
Oscar Díaz, Salvador Trujillo, Sandy P&eacu...
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
16 years 4 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
143
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
« Prev « First page 1030 / 1193 Last » Next »